CVE-2025-66208

9.8 CRITICAL

📋 TL;DR

CVE-2025-66208 is a critical OS command injection vulnerability in Collabora Online's built-in CODE server (richdocumentscode proxy). It allows remote attackers to execute arbitrary commands on the server by exploiting proxy.php through an intermediate reverse proxy. This affects Nextcloud users with the Collabora Online - Built-in CODE Server app installed.

💻 Affected Systems

Products:
  • Collabora Online - Built-in CODE Server (richdocumentscode)
  • Nextcloud with Collabora Online - Built-in CODE Server app
Versions: All versions prior to 25.04.702
Operating Systems: All platforms running Collabora Online
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the richdocumentscode proxy component and an intermediate reverse proxy configuration to be exploitable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attacker to execute arbitrary commands with server privileges, potentially leading to data theft, ransomware deployment, or complete server takeover.

🟠

Likely Case

Remote code execution leading to unauthorized access, data exfiltration, or installation of backdoors on vulnerable servers.

🟢

If Mitigated

Limited impact if proper network segmentation, WAF rules, and strict access controls are implemented to block malicious requests.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The advisory suggests exploitation requires specific proxy configurations but doesn't detail exact prerequisites.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 25.04.702

Vendor Advisory: https://github.com/CollaboraOnline/online/security/advisories/GHSA-j3q6-q5pc-v5wf

Restart Required: Yes

Instructions:

1. Update Collabora Online - Built-in CODE Server to version 25.04.702 or later. 2. Restart the Collabora Online service. 3. Verify the update was successful by checking the version.

🔧 Temporary Workarounds

Disable or restrict proxy.php access

all

Temporarily block or restrict access to the vulnerable proxy.php endpoint via web server configuration or firewall rules.

# Example for Apache: RewriteRule ^/proxy\.php$ - [F]
# Example for Nginx: location ~ /proxy\.php$ { deny all; }

Implement WAF rules

all

Deploy web application firewall rules to detect and block command injection attempts targeting the proxy endpoint.

🧯 If You Can't Patch

  • Isolate the Collabora Online server in a restricted network segment with no internet access.
  • Implement strict network access controls to limit which systems can communicate with the Collabora Online proxy endpoint.

🔍 How to Verify

Check if Vulnerable:

Check the Collabora Online version via admin interface or by examining installed packages. If version is below 25.04.702, the system is vulnerable.

Check Version:

# For Linux systems with package manager: dpkg -l | grep collabora-online OR rpm -qa | grep collabora-online

Verify Fix Applied:

Confirm the Collabora Online version is 25.04.702 or higher after applying the update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to proxy.php with shell metacharacters or command injection patterns
  • Unexpected process executions from the Collabora Online service user

Network Indicators:

  • Suspicious outbound connections from the Collabora Online server to external IPs
  • Unusual traffic patterns to/from the proxy.php endpoint

SIEM Query:

source="collabora_logs" AND uri="/proxy.php" AND (command="*;*" OR command="*|*" OR command="*`*" OR command="*$(*" OR command="*&*" OR command="*>" OR command="*<*")

🔗 References

📤 Share & Export